I

I. The Vulnerabilities">
II. The VulnerabilitiesE-mail attachments E-mail must get through your firewall to be useful, so it is a favorite delivery method among attackers.

Open ports (network or TCP ports) Not securing your ports is like leaving the windows open on your house: Anyone with a ladder can enter.

Outdated software Many software updates patch security problems. The older the hole, the more attackers will know how to exploit it.
Persistent connection The longer youre online, the more time attackers have to find and compromise you.
Uninformed user One who engages in risky computing behavior, such as using infected disks or not changing default passwords.

Matthew D. Sarrel, CISSP, is a network security,product development, and technical marketingconsultant based in New York City. He is also a gamereviewer and technical writer. To read his opinions on games please browse http://games.mattsarrel.com and for more general information on Matt, please see http://www.mattsarrel.com.